default search action
Konstantinos Fysarakis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2016
- [b1]Konstantinos Fysarakis:
Analysis and composition of security primitives towards a framework that safeguards the confidentiality, integrity and availability of embedded systems: uSPBM - a secure policy-based management framework for ubiquitous smart devices. Technical University of Crete, Greece, 2016
Journal Articles
- 2021
- [j15]Manos Papoutsakis, Konstantinos Fysarakis, George Spanoudakis, Sotiris Ioannidis:
Defining IoT Orchestrations with Security and Privacy by Design: A Gap Analysis. IEEE Internet Things Mag. 4(2): 80-87 (2021) - [j14]George Hatzivasilis, Othonas Soultatos, Panos Chatziadam, Konstantinos Fysarakis, Ioannis G. Askoxylakis, Sotiris Ioannidis, George Alexandris, Vasilios Katos, George Spanoudakis:
WARDOG: Awareness Detection Watchdog for Botnet Infection on the Host Device. IEEE Trans. Sustain. Comput. 6(1): 4-18 (2021) - 2020
- [j13]Arne Bröring, Jan Seeger, Manos Papoutsakis, Konstantinos Fysarakis, Ahmad Caracalli:
Networking-Aware IoT Application Development. Sensors 20(3): 897 (2020) - [j12]Andreas I. Miaoudakis, Konstantinos Fysarakis, Nikolaos E. Petroulakis, Sofia Alexaki, George Alexandirs, Sotiris Ioannidis, George Spanoudakis, Vasilis Katos, Christos V. Verikoukis:
Pairing a Circular Economy and the 5G-Enabled Internet of Things: Creating a Class of ?Looping Smart Assets? IEEE Veh. Technol. Mag. 15(3): 20-31 (2020) - 2018
- [j11]George Hatzivasilis, Konstantinos Fysarakis, Othonas Soultatos, Ioannis G. Askoxylakis, Ioannis Papaefstathiou, Giorgos Demetriou:
The Industrial Internet of Things as an enabler for a Circular Economy Hy-LP: A novel IIoT protocol, evaluated on a wind park's SDN/NFV-enabled 5G industrial network. Comput. Commun. 119: 127-137 (2018) - [j10]Nikolaos E. Petroulakis, Konstantinos Fysarakis, Ioannis G. Askoxylakis, George Spanoudakis:
Reactive security for SDN/NFV-enabled industrial networks leveraging service function chaining. Trans. Emerg. Telecommun. Technol. 29(7) (2018) - [j9]Konstantinos Fysarakis, Othonas Soultatos, Charalampos Manifavas, Ioannis Papaefstathiou, Ioannis G. Askoxylakis:
XSACd - Cross-domain resource sharing & access control for smart environments. Future Gener. Comput. Syst. 80: 572-582 (2018) - [j8]George Hatzivasilis, Konstantinos Fysarakis, Ioannis Papaefstathiou, Charalampos Manifavas:
A review of lightweight block ciphers. J. Cryptogr. Eng. 8(2): 141-184 (2018) - [j7]Konstantinos Rantos, Konstantinos Fysarakis, Charalampos Manifavas, Ioannis G. Askoxylakis:
Policy-Controlled Authenticated Access to LLN-Connected Healthcare Resources. IEEE Syst. J. 12(1): 92-102 (2018) - 2016
- [j6]Konstantinos Fysarakis, George Hatzivasilis, Charalampos Manifavas, Ioannis Papaefstathiou:
RtVMF: A Secure Real-Time Vehicle Management Framework. IEEE Pervasive Comput. 15(1): 22-30 (2016) - [j5]Charalampos Manifavas, George Hatzivasilis, Konstantinos Fysarakis, Yannis Papaefstathiou:
A survey of lightweight stream ciphers for embedded systems. Secur. Commun. Networks 9(10): 1226-1246 (2016) - [j4]Konstantinos Fysarakis, Damianos Mylonakis, Charalampos Manifavas, Ioannis Papaefstathiou:
Node.DPWS: Efficient Web Services for the Internet of Things. IEEE Softw. 33(3): 60-67 (2016) - 2015
- [j3]Charalampos Manifavas, Konstantinos Fysarakis, Alexandros Papanikolaou, Ioannis Papaefstathiou:
Embedded Systems Security: A Survey of EU Research Efforts. Secur. Commun. Networks 8(11): 2016-2036 (2015) - 2014
- [j2]Ilyas Potamitis, Iraklis I. Rigakis, Konstantinos Fysarakis:
The Electronic McPhail Trap. Sensors 14(12): 22285-22299 (2014) - 2012
- [j1]Konstantinos Rantos, Konstantinos Fysarakis, Charalampos Manifavas:
How Effective Is Your Security Awareness Program? An Evaluation Methodology. Inf. Secur. J. A Glob. Perspect. 21(6): 328-345 (2012)
Conference and Workshop Papers
- 2024
- [c36]Panagiotis Bountakas, Konstantinos Fysarakis, Thomas Kyriakakis, Panagiotis Karafotis, Aristeidis Sotiropoulos, Maria Tasouli, Cristina Alcaraz, George Alexandris, Vassiliki Andronikou, Tzortzia Koutsouri, Romarick Yatagha, George Spanoudakis, Sotiris Ioannidis, Fabio Martinelli, Oleg Illiashenko:
SYNAPSE - An Integrated Cyber Security Risk & Resilience Management Platform, With Holistic Situational Awareness, Incident Response & Preparedness Capabilities: SYNAPSE. ARES 2024: 128:1-128:10 - [c35]Rafail A. Ellinitakis, Konstantinos Fysarakis, Panagiotis Bountakas, George Spanoudakis:
Uncovering Hidden Threats: Automated, Machine Learning-based Discovery & Extraction of Cyber Threat Intelligence from Online Sources. CSR 2024: 1-6 - [c34]Alexios Lekidis, Vasileios Mavroeidis, Konstantinos Fysarakis:
Towards Incident Response Orchestration and Automation for the Advanced Metering Infrastructure. WFCS 2024: 1-8 - 2023
- [c33]Mateusz D. Zych, Vasileios Mavroeidis, Konstantinos Fysarakis, Manos Athanatos:
Reviewing BPMN as a Modeling Notation for CACAO Security Playbooks. CSR 2023: 490-495 - [c32]Konstantinos Fysarakis, Alexios Lekidis, Vasileios Mavroeidis, Konstantinos Lampropoulos, George L. Lyberopoulos, Ignasi Garcia-Milà Vidal, José Carles Terés i Casals, Eva Rodriguez Luna, Alejandro Antonio Moreno Sancho, Antonios Mavrelos, Marinos Tsantekidis, Sebastian Pape, Argyro Chatzopoulou, Christina Nanou, George Drivas, Vangelis Photiou, George Spanoudakis, Odysseas G. Koufopavlou:
PHOENI2X - A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation & Response Capabilities for Business Continuity and Recovery, Incident Response, and Information Exchange. CSR 2023: 538-545 - 2022
- [c31]Konstantinos Fysarakis, Vasileios Mavroeidis, Manos Athanatos, George Spanoudakis, Sotiris Ioannidis:
A Blueprint for Collaborative Cybersecurity Operations Centres with Capacity for Shared Situational Awareness, Coordinated Response, and Joint Preparedness. IEEE Big Data 2022: 2601-2609 - [c30]Arne Bröring, Vivek Kulkarni, Andreas Zirkler, Philippe Buschmann, Konstantinos Fysarakis, Simon Mayer, Beatriz Soret, Lam Duc Nguyen, Petar Popovski, Sumudu Samarakoon, Mehdi Bennis, Jérôme Härri, Martijn N. Rooker, Gerald Fritz, Anca Bucur, George Spanoudakis, Sotiris Ioannidis:
IntellIoT: Intelligent IoT Environments. GIOTS 2022: 55-68 - 2020
- [c29]Michail Smyrlis, Konstantinos Fysarakis, George Spanoudakis, George Hatzivasilis:
Cyber Range Training Programme Specification Through Cyber Threat and Training Preparation Models. MSTEC 2020: 22-37 - [c28]Manos Papoutsakis, Konstantinos Fysarakis, Manolis Michalodimitrakis, Eftychia Lakka, Nikos Petroulakis, George Spanoudakis, Sotiris Ioannidis:
A Pattern-Driven Adaptation in IoT Orchestrations to Guarantee SPDI Properties. MSTEC 2020: 143-156 - 2019
- [c27]Othonas Soultatos, Manos Papoutsakis, Konstantinos Fysarakis, George Hatzivasilis, Manos Michalodimitrakis, George Spanoudakis, Sotiris Ioannidis:
Pattern-Driven Security, Privacy, Dependability and Interoperability Management of IoT Environments. CAMAD 2019: 1-6 - [c26]George Hatzivasilis, Nikos Christodoulakis, Christos Tzagkarakis, Sotiris Ioannidis, Giorgos Demetriou, Konstantinos Fysarakis, Marios Panayiotou:
The CE-IoT Framework for Green ICT Organizations: The interplay of CE-IoT as an enabler for green innovation and e-waste management in ICT. DCOSS 2019: 436-442 - [c25]Iason Somarakis, Michail Smyrlis, Konstantinos Fysarakis, George Spanoudakis:
Model-Driven Cyber Range Training: A Cyber Security Assurance Perspective. IOSec/MSTEC/FINSEC@ESORICS 2019: 172-184 - [c24]Othonas Soultatos, Konstantinos Fysarakis, George Spanoudakis, Hristo Koshutanski, Ernesto Damiani, Kristian Beckers, Dirk Wortmann, George Bravos, Menelaos Ioannidis:
The THREAT-ARREST Cyber-Security Training Platform. IOSec/MSTEC/FINSEC@ESORICS 2019: 199-214 - [c23]Konstantinos Fysarakis, George Spanoudakis, Nikolaos E. Petroulakis, Othonas Soultatos, Arne Bröring, Tobias Marktscheffel:
Architectural Patterns for Secure IoT Orchestrations. GIoTS 2019: 1-6 - [c22]Nikolaos E. Petroulakis, Eftychia Lakka, Ermin Sakic, Vivek Kulkarni, Konstantinos Fysarakis, Iason Somarakis, Jordi Serra, Luis Sanabria-Russo, Danilo Pau, Mirko Falchetto, Domenico Presenza, Tobias Marktscheffel, Kostas Ramantas, Prodromos-Vasileios Mekikis, Lukasz Ciechomski, Karolina Waledzik:
SEMIoTICS Architectural Framework: End-to-end Security, Connectivity and Interoperability for Industrial IoT. GIoTS 2019: 1-6 - [c21]Konstantinos Fysarakis, Manos Papoutsakis, Nikolaos E. Petroulakis, George Spanoudakis:
Towards IoT Orchestrations with Security, Privacy, Dependability and Interoperability Guarantees. GLOBECOM 2019: 1-6 - [c20]George Hatzivasilis, Lukasz Ciechomski, Othonas Soultatos, Darko Anicic, Arne Bröring, Konstantinos Fysarakis, George Spanoudakis, Eftychia Lakka, Sotiris Ioannidis, Mirko Falchetto:
Secure Semantic Interoperability for IoT Applications with Linked Data. GLOBECOM 2019: 1-6 - 2018
- [c19]George Hatzivasilis, Ioannis G. Askoxylakis, George Alexandris, Darko Anicic, Arne Bröring, Vivek Kulkarni, Konstantinos Fysarakis, George Spanoudakis:
The Interoperability of Things: Interoperable solutions as an enabler for IoT and Web 3.0. CAMAD 2018: 1-7 - [c18]Othonas Soultatos, George Spanoudakis, Konstantinos Fysarakis, Ioannis G. Askoxylakis, George Alexandris, Andreas I. Miaoudakis, Nikolaos E. Petroulakis:
Towards a Security, Privacy, Dependability, Interoperability Framework for the Internet of Things. CAMAD 2018: 1-6 - [c17]Emmanouil Palavras, Konstantinos Fysarakis, Ioannis Papaefstathiou, Ioannis G. Askoxylakis:
SeMIBIoT: Secure Multi-Protocol Integration Bridge for the IoT. ICC 2018: 1-7 - [c16]Ermin Sakic, Vivek Kulkarni, Vasileios Theodorou, Anton Matsiuk, Simon Kuenzer, Nikolaos E. Petroulakis, Konstantinos Fysarakis:
VirtuWind - An SDN- and NFV-Based Architecture for Softwarized Industrial Networks. MMB 2018: 251-261 - [c15]George Hatzivasilis, Konstantinos Fysarakis, Ioannis G. Askoxylakis, Alexander Bilanakos:
CloudNet Anti-malware Engine: GPU-Accelerated Network Monitoring for Cloud Services. IOSec@RAID 2018: 122-133 - 2017
- [c14]George Hatzivasilis, Ioannis Papaefstathiou, Konstantinos Fysarakis, Ioannis G. Askoxylakis:
SecRoute: End-to-end secure communications for wireless ad-hoc networks. ISCC 2017: 558-563 - [c13]Konstantinos Fysarakis, Nikolaos E. Petroulakis, Andreas Roos, Khawar Abbasi, Petra Vizarreta, George P. Petropoulos, Ermin Sakic, George Spanoudakis, Ioannis G. Askoxylakis:
A Reactive Security Framework for operational wind parks using Service Function Chaining. ISCC 2017: 663-668 - [c12]Sotirios Katsikeas, Konstantinos Fysarakis, Andreas I. Miaoudakis, Amaury Van Bemten, Ioannis G. Askoxylakis, Ioannis Papaefstathiou, Anargyros Plemenos:
Lightweight & secure industrial IoT communications via the MQ telemetry transport protocol. ISCC 2017: 1193-1200 - 2016
- [c11]Konstantinos Fysarakis, Ioannis G. Askoxylakis, Othonas Soultatos, Ioannis Papaefstathiou, Charalampos Manifavas, Vasilios Katos:
Which IoT Protocol? Comparing Standardized Approaches over a Common M2M Application. GLOBECOM 2016: 1-7 - 2015
- [c10]Konstantinos Fysarakis, George Hatzivasilis, Ioannis G. Askoxylakis, Charalampos Manifavas:
RT-SPDM: Real-Time Security, Privacy and Dependability Management of Heterogeneous Systems. HCI (22) 2015: 619-630 - [c9]Konstantinos Fysarakis, Charalampos Konstantourakis, Konstantinos Rantos, Charalampos Manifavas, Ioannis Papaefstathiou:
WSACd - A Usable Access Control Framework for Smart Home Devices. WISTP 2015: 120-133 - [c8]Konstantinos Rantos, Konstantinos Fysarakis, Othonas Sultatos, Ioannis G. Askoxylakis:
Secure and Authenticated Access to LLN Resources Through Policy Constraints. WISTP 2015: 271-280 - 2014
- [c7]Konstantinos Fysarakis, Ioannis Papaefstathiou, Charalampos Manifavas, Konstantinos Rantos, Othonas Sultatos:
Policy-based access control for DPWS-enabled ubiquitous devices. ETFA 2014: 1-8 - [c6]Charalampos Manifavas, Konstantinos Fysarakis, Konstantinos Rantos, George Hatzivasilis:
DSAPE - Dynamic Security Awareness Program Evaluation. HCI (24) 2014: 258-269 - [c5]Konstantinos Fysarakis, George Hatzivasilis, Konstantinos Rantos, Alexandros Papanikolaou, Charalampos Manifavas:
Embedded Systems Security Challenges. PECCS 2014: 255-266 - [c4]Charalampos Manifavas, Konstantinos Fysarakis, Konstantinos Rantos, Konstantinos Kagiambakis, Ioannis Papaefstathiou:
Policy-Based Access Control for Body Sensor Networks. WISTP 2014: 150-159 - 2013
- [c3]Charalampos Manifavas, George Hatzivasilis, Konstantinos Fysarakis, Konstantinos Rantos:
Lightweight Cryptography for Embedded Systems - A Comparative Analysis. DPM/SETOP 2013: 333-349 - [c2]Konstantinos Fysarakis, Charalampos Manifavas, Ioannis Papaefstathiou, Anastasios Adamopoulos:
A lightweight anonymity & location privacy service. ISSPIT 2013: 124-129 - 2012
- [c1]Konstantinos Rantos, Alexandros Papanikolaou, Konstantinos Fysarakis, Charalampos Manifavas:
Secure policy-based management solutions in heterogeneous embedded systems networks. TEMU 2012: 227-232
Informal and Other Publications
- 2024
- [i7]Alexios Lekidis, Vasileios Mavroeidis, Konstantinos Fysarakis:
Towards Incident Response Orchestration and Automation for the Advanced Metering Infrastructure. CoRR abs/2403.06907 (2024) - 2023
- [i6]Mateusz D. Zych, Vasileios Mavroeidis, Konstantinos Fysarakis, Manos Athanatos:
Reviewing BPMN as a Modeling Notation for CACAO Security Playbooks. CoRR abs/2305.18928 (2023) - [i5]Konstantinos Fysarakis, Alexios Lekidis, Vasileios Mavroeidis, Konstantinos Lampropoulos, George L. Lyberopoulos, Ignasi Garcia-Milà Vidal, José Carles Terés i Casals, Eva Rodriguez Luna, Alejandro Antonio Moreno Sancho, Antonios Mavrelos, Marinos Tsantekidis, Sebastian Pape, Argyro Chatzopoulou, Christina Nanou, George Drivas, Vangelis Photiou, George Spanoudakis, Odysseas G. Koufopavlou:
PHOENI2X - A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation and Response Capabilities for Business Continuity and Recovery, Incident Response, and Information Exchange. CoRR abs/2307.06932 (2023) - 2020
- [i4]George Hatzivasilis, Konstantinos Fysarakis, Sotiris Ioannidis:
Cyber-Ranges as a Mean of Security Culture Establishment. ERCIM News 2020(121) (2020) - 2019
- [i3]Ermin Sakic, Vivek Kulkarni, Vasileios Theodorou, Anton Matsiuk, Simon Kuenzer, Nikolaos E. Petroulakis, Konstantinos Fysarakis:
VirtuWind - An SDN- and NFV-based Architecture for Softwarized Industrial Networks. CoRR abs/1902.02539 (2019) - [i2]Nikolaos E. Petroulakis, Konstantinos Fysarakis, Sotiris Ioannidis, George Spanoudakis, Vivek Kulkarni:
Smart End-to-end Massive IoT Interoperability, Connectivity and Security (SEMIoTICS). ERCIM News 2019(119) (2019) - 2015
- [i1]Konstantinos Fysarakis, Damianos Mylonakis, Charalampos Manifavas, Ioannis Papaefstathiou:
Node.DPWS: High performance and scalable Web Services for the IoT. CoRR abs/1503.01398 (2015)
Coauthor Index
aka: Yannis Papaefstathiou
aka: Nikolaos E. Petroulakis
aka: Othonas Soultatos
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint